Interactive log encryption, retrieval and anti-theft method and device based on block chain

An encryption method and blockchain technology, applied in the field of retrieval, blockchain-based interaction log encryption, and anti-theft, which can solve problems such as theft of interaction logs.

Active Publication Date: 2019-11-01
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current interaction log still has a certain risk of being stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interactive log encryption, retrieval and anti-theft method and device based on block chain
  • Interactive log encryption, retrieval and anti-theft method and device based on block chain
  • Interactive log encryption, retrieval and anti-theft method and device based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0106] The background technology of this application is an invention based on the blockchain, but it should be understood that even if it is separated from the blockchain, this application can also be implemented, that is, this application can also be extended to a conventional network without being subject to Blockchain network structure limitations.

[0107] An embodiment of the present application provides a system for encrypting and decrypting an interacti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an interaction log encryption, calling and anti-theft method and device based on a block chain. The method comprises the following steps: splitting biological characteristic information at a terminal; obtaining a corresponding component (the component is a reference characteristic component during registration and the component is a characteristic component during use); then, each component is encrypted by adopting at least one specific encryption mode; the encryption mode of each component is independent; then, the encrypted component is uploaded to the device; according to the method and the device, the split component is obtained through decryption of the device, decryption or matching is carried out by utilizing the split component, so that calling of the interactive log is realized, on one hand, the split mode cannot be stolen, on the other hand, each component is encrypted, and the component is used as a secret key to protect transaction data, so that the security of the interactive log is greatly improved.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, and more specifically, to a blockchain-based interaction log encryption, retrieval, and anti-theft method and device. Background technique [0002] Identity authentication is an effective solution to the process of confirming the operator's identity in a computer network. Biometrics prove your identity based on unique identification characteristics. Biometrics is a comprehensive application or solution for identification, intelligent perception, etc. through the collection and analysis of the inherent physiological or behavioral characteristics of the human body, combined with various high-tech means. Since users do not need to remember passwords and carry media, it is easy to use and is more and more widely used in financial business scenarios such as account opening and payment. Among them, face recognition technology is widely used due to its non-invasive, non-inducti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/04G06Q20/40G06Q20/38G06F21/60
CPCG06Q40/04G06Q20/3829G06Q20/40145G06Q20/389G06F21/602
Inventor 岑健明夏韵李狄威周颖
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products